t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
- Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian
- Computer ScienceIEEE International Conference on Data Engineering
- 15 April 2007
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain…
Locally Differentially Private Protocols for Frequency Estimation
- Tianhao Wang, Jeremiah Blocki, Ninghui Li, S. Jha
- Computer ScienceUSENIX Security Symposium
- 1 August 2017
This paper introduces a framework that generalizes several LDP protocols proposed in the literature and yields a simple and fast aggregation algorithm, whose accuracy can be precisely analyzed, resulting in two new protocols that provide better utility than protocols previously proposed.
Design of a role-based trust-management framework
- Ninghui Li, John C. Mitchell, W. Winsborough
- Computer ScienceProceedings IEEE Symposium on Security and…
- 12 May 2002
The RT framework, a family of role-based trust management languages for representing policies and credentials in distributed authorization, is introduced, and the semantics of credentials are defined by presenting a translation from credentials to Datalog rules.
Distributed Credential Chain Discovery in Trust Management
- Ninghui Li, W. Winsborough, John C. Mitchell
- Computer ScienceJournal of computing and security
- 1 February 2003
A storage type system for RT0, which guarantees traversability of chains when credentials are well typed, can also help improve search efficiency by guiding search in the right direction, making distributed chain discovery with large number of credentials feasible.
A Study of Probabilistic Password Models
- Jerry Ma, Weining Yang, Min Luo, Ninghui Li
- Computer ScienceIEEE Symposium on Security and Privacy
- 26 March 2014
This paper finds that Markov models, when done correctly, perform significantly better than the Probabilistic Context-Free Grammar model proposed in Weir et al., which has been used as the state-of-the-art password model in recent research.
Satisfiability and Resiliency in Workflow Authorization Systems
- Qihua Wang, Ninghui Li
- Computer ScienceTSEC
- 1 December 2010
This work proposes the role-and-relation-based access control (R2BAC) model for workflow authorization systems, and formally defines three levels of resiliency in workflow systems and study computational problems related to these notions of Resiliency.
Slicing: A New Approach for Privacy Preserving Data Publishing
- Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
- Computer ScienceIEEE Transactions on Knowledge and Data…
- 11 September 2009
A novel technique called slicing is presented, which partitions the data both horizontally and vertically and can be used for attribute disclosure protection and develops an efficient algorithm for computing the sliced data that obey the ℓ-diversity requirement.
Differentially private grids for geospatial data
- Wahbeh H. Qardaji, Weining Yang, Ninghui Li
- Computer ScienceIEEE International Conference on Data Engineering
- 6 September 2012
This paper proposes a method for choosing a grid size for two-dimensional datasets such as geospatial datasets, and introduces a novel adaptive-grid method, which exploits the need to have finer granularity partitioning over dense regions and, at the same time, coarse partitions over sparse regions.
Efficient k -Anonymization Using Clustering Techniques
- Ji-Won Byun, Ashish Kamra, E. Bertino, Ninghui Li
- Computer ScienceInternational Conference on Database Systems for…
- 9 April 2007
An approach that uses the idea of clustering to minimize information loss and thus ensure good data quality is proposed, and a suitable metric to estimate the information loss introduced by generalizations is developed, which works for both numeric and categorical data.
Delegation logic: A logic-based approach to distributed authorization
- Ninghui Li, Benjamin N. Grosof, J. Feigenbaum
- Computer ScienceTSEC
- 1 February 2003
D1LP provides a concept of proof-of-compliance that is founded on well-understood principles of logic programming and knowledge representation, and provides a logical framework for studying delegation.
...
...